Article
Chemistry, Multidisciplinary
Amir Djenna, Saad Harous, Djamel Eddine Saidouni
Summary: The Internet of Things (IoT) is a promising technology for innovating society, but IoT-based critical infrastructures are increasingly targeted by cybercriminals. Enhancing cybersecurity measures is crucial to protect these infrastructures, and identifying and mapping cyber threats is an important step in addressing cybersecurity challenges.
APPLIED SCIENCES-BASEL
(2021)
Review
Chemistry, Analytical
Theresa Sobb, Benjamin Turnbull, Nour Moustafa
Summary: Cyber-Physical-Social System (CPSS) is a subset of Cyber-Physical Systems (CPS) that connects the cyber, physical, and social domains to provide automated and secure services. With the integration of physical, social, and cyber components, CPSS has the potential to address complex societal problems, enhance the development of IoT, big data analytics, and machine learning, and improve efficiency, sustainability, and decision making. CPSS presents opportunities for innovation and improvement in various domains, benefiting people's quality of life worldwide.
Article
Computer Science, Information Systems
Huici Wu, Qiuyue Gao, Xiaofeng Tao, Ning Zhang, Dajiang Chen, Zhu Han
Summary: This article studies the competition of network resources among IoT devices, with the attacker and defender as the players. By modeling the system and employing optimal control theory, the evolution of security states is analyzed. The results demonstrate that the formulated model effectively characterizes the strategic interactions between the attacker and defender, capturing the evolution of security states accurately.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Muhammad Umer, Saima Sadiq, Hanen Karamti, Reemah M. Alhebshi, Khaled Alnowaiser, Ala' Abdulmajid Eshmawi, Houbing Song, Imran Ashraf
Summary: This paper discusses the security threats, vulnerabilities, challenges, and attacks of cyber-physical systems (CPS). It presents the architecture of CPS and elaborates on the different cyber-physical attacks and associated issues. The application of deep learning models in CPS and their performance comparison is also analyzed. Future research directions for cyber-physical security are provided.
Article
Chemistry, Multidisciplinary
Emily Kate Parsons, Emmanouil Panaousis, George Loukas, Georgia Sakellari
Summary: In this paper, a comprehensive survey of cyber risk management processes in the context of IoT is presented, and recommendations for future work are provided. Through the analysis of 39 collected papers, IoT cyber risk management frameworks are studied against four research questions that focus on cyber risk management concepts and human-orientated vulnerabilities. The importance of this work lies in understanding how individuals can impact risk and how humans can be affected by attacks in different IoT domains.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Artificial Intelligence
Thanh Thi Nguyen, Vijay Janapa Reddi
Summary: This article presents a survey of DRL approaches developed for cyber security, including vital aspects such as DRL-based security methods for cyber-physical systems and autonomous intrusion detection techniques. It also discusses multiagent DRL-based game theory simulations for defense strategies against cyberattacks. Future research directions and extensive discussions on DRL-based cyber security are provided.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS
(2023)
Article
Computer Science, Information Systems
Rodrigo Matos Carnier, Yue Li, Yasutaka Fujimoto, Junji Shikata
Summary: In the age of IoT, the exploitation of security vulnerabilities and self-propagating IoT malware are on the rise. This article presents a simple derivation of the exact Markov chain for random propagation of malware, which is validated through a stochastic simulation. Furthermore, a new system of malware mitigation at the network level, based on grouping infected devices, is introduced to counteract the vulnerability of mass deployment of IoT devices.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Jing Li, Tingting Liu, Dusit Niyato, Ping Wang, Jun Li, Zhu Han
Summary: This article focuses on designing appropriate security deposits for IoT device owners to bridge blockchain and IoT users, providing economic incentives while maintaining security incentives for sharded blockchain. By proposing joint models under the contract theory framework, it efficiently addresses the problems of adverse selection and moral hazard, as well as adverse selection and tournament, to maximize profit for blockchain and determine optimal rewards and security deposits for different participants. Simulation results indicate that these models can overcome asymmetric information and offer feasible contracts without compromising security incentives for the sharded blockchain.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Lisa Liu, Daryl Essam, Timothy Lynar
Summary: This article examines the complexity of IoT traffic and proposes two new metrics. Through comparative experiments, the new methods are proven to outperform existing approaches, particularly in heterogeneous conditions.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Daojing He, Ziming Zhao, Sammy Chan, Mohsen Guizani
Summary: This article proposes an identity authentication protocol between embedded devices and servers using elliptic curve encryption and timestamp security attributes. The protocol ensures device anonymity and prevents replay attacks. The security and performance of the protocol are proven through formal verification and experimental comparison with existing protocols.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Mohammed Aledhari, Hadis Karimipour
Summary: Internet of Things (IoT) is a promising technology that aims to enhance humans' quality of life in various fields. Discussing and analyzing IoT security issues is crucial for developers and enterprises to find appropriate solutions and provide the best possible IoT-based services. This paper provides a comprehensive study on IoT security issues, limitations, requirements, and current and potential solutions, with a focus on classifying potential threats and challenges by an architectural view.
INTERNET OF THINGS
(2021)
Article
Computer Science, Artificial Intelligence
Alvaro Michelena, Jose Aveleira-Mata, Esteban Jove, Hector Alaiz-Moreton, Hector Quintian, Jose Luis Calvo-Rolle
Summary: The prevalence of IoT systems has led to an increase in attacks, including Denial of Service attacks on main IoT protocols. This paper evaluates the performance of six classification techniques and Principal Component Analysis method in detecting DoS attacks in MQTT networks, achieving excellent results.
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE
(2023)
Article
Automation & Control Systems
Mahdi Khosravy, Kazuaki Nakamura, Naoko Nitta, Nilanjan Dey, Ruben Gonzalez Crespo, Enrique Herrera-Viedma, Noboru Babaguchi
Summary: Inversion attack (MIA) poses a threat to deep-learning-based recognition systems (DLRSs). This research proposes a social IoT approach for collaborative defense against MIA-generated data clones. The proposed technique utilizes a collaborative recognition system to verify the output of the targeted recognition system, achieving a high detection rate for MIA-generated clones.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2023)
Article
Computer Science, Information Systems
Mohammad Wazid, Ashok Kumar Das, Noor Mohd, Youngho Park
Summary: Healthcare 5.0 is a system that provides various healthcare services utilizing new generation information technologies, transitioning from a disease-centered to patient-centered care paradigm. However, there are security issues and challenges in Healthcare 5.0, requiring a robust framework for data protection.
Review
Environmental Sciences
Abubakar Bello, Sayka Jahan, Farnaz Farid, Farhad Ahamed
Summary: Cybersecurity risks are a persistent challenge for water infrastructure management in Australia and globally. This study evaluates the current state of cyber attacks and controls for water infrastructure in Australia through a systematic literature review, and suggests future research directions. The review highlights the critical importance of managing security vulnerabilities and threats in SCADA water control systems.
Article
Automation & Control Systems
Pirathayini Srikantha, Deepa Kundur
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2017)
Article
Green & Sustainable Science & Technology
Pirathayini Srikantha, Deepa Kundur
IEEE TRANSACTIONS ON SUSTAINABLE ENERGY
(2017)
Article
Engineering, Electrical & Electronic
Pirathayini Srikantha, Deepa Kundur
IEEE SIGNAL PROCESSING MAGAZINE
(2019)
Article
Engineering, Electrical & Electronic
Jingyuan Liu, Pirathayini Srikantha
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
(2019)
Article
Engineering, Electrical & Electronic
Mithun Mallick, Pirathayini Srikantha
IEEE TRANSACTIONS ON SMART GRID
(2020)
Article
Engineering, Electrical & Electronic
Junfei Wang, Pirathayini Srikantha
Summary: This paper discusses how smart meters generate large volumes of electricity usage data in the modern power grid, and how electric power utility companies and third-party entities gain insights through machine learning models to foster economical and sustainable electricity usage. It also proposes an attack model targeting deep learning models, which does not require knowledge of training data, internal parameters, and model structure, with profound impacts on energy analytics and decision-making processes.
IEEE TRANSACTIONS ON SMART GRID
(2021)
Article
Engineering, Electrical & Electronic
Fayas Ahamed, Pirathayini Srikantha
Summary: This paper investigates the challenges and requirements of the modern grid and proposes an optimization control method to reduce thermal losses, regulate voltage, and balance power demand and supply. The efficacy of the proposed method is demonstrated through practical experiments.
IEEE TRANSACTIONS ON SMART GRID
(2022)
Article
Engineering, Electrical & Electronic
Jingyuan Liu, Pirathayini Srikantha
Summary: This paper introduces a Gaussian Process emulator for data-driven probabilistic load flow analysis on distribution networks, eliminating the need for knowledge of underlying system parameters. Through a kernel selection process formulated as a bi-level optimization problem and a best-response strategy refinement process, an efficient kernel configuration is achieved.
IEEE TRANSACTIONS ON SMART GRID
(2022)
Article
Engineering, Electrical & Electronic
Junfei Wang, Pirathayini Srikantha
Summary: Concerns about climate change are driving the integration of renewable energy sources, storage systems, electric vehicles, and diverse consumer loads. The inherent uncertainties in these power entities affect the economic operations and integrity of the electrical grid. This paper proposes a novel data-driven approach to enable real-time optimal power flow (OPF) studies by combining generative learning, information theory, and domain knowledge.
IEEE TRANSACTIONS ON POWER SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Jingyuan Liu, Pirathayini Srikantha
Summary: This work focuses on adaptively reconfiguring the electrical topology of the Distribution Network (DN) to mitigate reliability issues such as over-voltage, under-voltage, and overcurrent conditions. The approach utilizes mixed integer non-linear programming, signal exchange, and strategic decompositions to address non-convexities in the problem formulation. Simulation studies and comparisons with state-of-the-art technologies demonstrate the efficacy of the proposed algorithm.
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
(2021)
Article
Engineering, Electrical & Electronic
Pirathayini Srikantha, Mithun Mallick
IEEE TRANSACTIONS ON POWER SYSTEMS
(2020)
Article
Engineering, Electrical & Electronic
Samer El Kababji, Pirathayini Srikantha
IEEE TRANSACTIONS ON SMART GRID
(2020)
Article
Engineering, Electrical & Electronic
Pirathayini Srikantha, Deepa Kundur
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
(2019)